Elad Schreiber, Product Manager for GFI Cloud, talks about the latest release and the addition of remote administration tools to the Monitoring feature.
Q: Tell us about the latest GFI Cloud release?
This release sees further enhancements to GFI Cloud’s Monitoring service with the introduction of a set of remote administration tools. Command Line, Process Manager and PowerShell command line will be familiar tools for most of our customers, and by incorporating these into the GFI Cloud platform they will now be able to use these tools remotely, from the same online console as the rest of their GFI Cloud services. Continue reading →
The Business Computing Weekly Podcast Episode # 419
This episode, the focus of the podcast turns to keeping your network safe and protecting your data. The following are discussed.
1. Hackers Vs. Crackers. Threats come from many sources including your employees
2: Be careful of movie devices, and BYOD (Bring your Own Devices).
3. The ongoing battle of Zero Day attacks
4. 95.6% of mobile devices users put company data at risk by using public wifi
5. Reasons to develop a layered security approach
6 Crackers are taking advantage of social networks
7. The responsibility that comes with large amounts of storage
8. Keeping patch management front and center in your policies
9. Thoughts about “Shoulder Surfing”
10. 32% of IT Admins do not test their backup solutions
11. When employees of rogue. Stealth technologies in the workplace.
Rich repositories of personal, clinical and financial data, combined with relatively modest information management capabilities, make medical practices prime candidates for numerous cyber threats, from hacking to computer viruses. These threats will likely be more widespread as practice management systems increase in sophistication, patient information becomes more connected through electronic health records and health information exchanges and health data became more accessible as practices increase their use of tablets, smartphones and other mobile devices. Continue reading →
The big trend in IT from the do-it-yourself business owner to the enterprise is cloud-based IT management. It’s not just because “the cloud” is the big buzzword and no one wants to be left behind. It’s because cloud-based IT management makes sense. It can save you money, save you time, and provide you with access to software that would otherwise be out of reach. Let’s take a look at some of the things that make cloud-based IT management the next big thing for IT teams. Continue reading →
Although not all stories in the tech press are directly related to security, they often highlight issues that can be excellent educational material. A recent story in The Register about a researcher who wanted to map the Internet caught my attention.
The researcher had a Herculean task to complete: to scan billions of IP addresses using the few computers he had at his disposal. He obviously needed help but where does one find that level of assistance? The researcher gave this some thought and decided to try and exploit insecure systems connected to the Internet. That surely would help. Continue reading →
Not everyone understands that network security isn’t just about one specific issue. As a result, many end up not taking the required action to secure their networks. Some businesses believe that investing in an antivirus solution will cover every base. Some wouldn’t even go that far as they’d think that a good firewall can prevent anything bad from entering the business network. If only they knew how wrong they are. Continue reading →
We had published an article called ‘13 IT Projects to Include in Your Plans for 2013’ in which we suggested 13 great IT projects for you to consider; we decided to publish some follow-up articles to help do just that.
Our seventh project suggestion was for spam filtering – here’s what we had to say:
Spam volumes continue to rise, and Outlook’s junk mail filters just are not enough anymore. 2013 can be the year you finally get a handle on spam by implementing spam filtering. Whether you deploy something on-premise or in the cloud, blocking spam, phishing, and malware infected messages before they get to your users is something everyone will appreciate. Continue reading →
Google sounded the death knell of Postini when it started releasing similar features natively within Google Apps. Now Google has announced the end of Postini. This has presented a very real problem for 26 million Postini users – who can either pay more in the long run and use Google Apps, or move to another service to get what they need and avoiding paying for what they don’t.
While cloud-based email protection has brought many advantages to business, migrating from one provider to another can pose challenges. The Google product forums about the difference in services offered by Google may well be cause for concern for current customers. Continue reading →